General

  • Target

    1109cfb0d3180e6a4b9846a384a4b35126ecdd6f0850fe4c77385bd90117aa11

  • Size

    951KB

  • Sample

    240522-xeasyacf24

  • MD5

    a8aa02d35b3c8b728ca4ab681bd471c6

  • SHA1

    773deb7ffa74ec1b6d80e1e10e167b93c4956526

  • SHA256

    1109cfb0d3180e6a4b9846a384a4b35126ecdd6f0850fe4c77385bd90117aa11

  • SHA512

    5c33e6af1c82e07a7f3e7055939fd3635b4479f3b26eb607c93431f7ad26fe17ea1e122e2cbec4c6ba296913dd542204545ec66db9c1b5342e2379911f510ec0

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      1109cfb0d3180e6a4b9846a384a4b35126ecdd6f0850fe4c77385bd90117aa11

    • Size

      951KB

    • MD5

      a8aa02d35b3c8b728ca4ab681bd471c6

    • SHA1

      773deb7ffa74ec1b6d80e1e10e167b93c4956526

    • SHA256

      1109cfb0d3180e6a4b9846a384a4b35126ecdd6f0850fe4c77385bd90117aa11

    • SHA512

      5c33e6af1c82e07a7f3e7055939fd3635b4479f3b26eb607c93431f7ad26fe17ea1e122e2cbec4c6ba296913dd542204545ec66db9c1b5342e2379911f510ec0

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5J:Rh+ZkldDPK8YaKjJ

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks